Search results for: arc flash protection
1631 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data
Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda
Abstract:
Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.Keywords: BGP, BGP hijacking, cybersecurity, detection
Procedia PDF Downloads 791630 The Corrosion Resistance of the 32CrMoV13 Steel Nitriding
Authors: Okba Belahssen, Lazhar Torchane, Said Benramache, Abdelouahed Chala
Abstract:
This paper presents corrosion behavior of the plasma-nitrided 32CrMoV13 steel. Different kinds of samples were tested: non-treated, plasma nitrided samples. The structure of layers was determined by X-ray diffraction, while the morphology was observed by scanning electron microscopy (SEM). The corrosion behavior was evaluated by electrochemical techniques (potentiodynamic curves and electrochemical impedance spectroscopy). The corrosion tests were carried out in acid chloride solution (HCl 1M). Experimental results showed that the nitrides ε-Fe2−3N and γ′-Fe4N present in the white layer are nobler than the substrate but may promote, by galvanic effect, a localized corrosion through open porosity. The better corrosion protection was observed for nitrided sample.Keywords: plasma-nitrided, 32CrMoV13 steel, corrosion, EIS
Procedia PDF Downloads 5881629 Effect of Cutting Tools and Working Conditions on the Machinability of Ti-6Al-4V Using Vegetable Oil-Based Cutting Fluids
Authors: S. Gariani, I. Shyha
Abstract:
Cutting titanium alloys are usually accompanied with low productivity, poor surface quality, short tool life and high machining costs. This is due to the excessive generation of heat at the cutting zone and difficulties in heat dissipation due to relatively low heat conductivity of this metal. The cooling applications in machining processes are crucial as many operations cannot be performed efficiently without cooling. Improving machinability, increasing productivity, enhancing surface integrity and part accuracy are the main advantages of cutting fluids. Conventional fluids such as mineral oil-based, synthetic and semi-synthetic are the most common cutting fluids in the machining industry. Although, these cutting fluids are beneficial in the industries, they pose a great threat to human health and ecosystem. Vegetable oils (VOs) are being investigated as a potential source of environmentally favourable lubricants, due to a combination of biodegradability, good lubricous properties, low toxicity, high flash points, low volatility, high viscosity indices and thermal stability. Fatty acids of vegetable oils are known to provide thick, strong, and durable lubricant films. These strong lubricating films give the vegetable oil base stock a greater capability to absorb pressure and high load carrying capacity. This paper details preliminary experimental results when turning Ti-6Al-4V. The impact of various VO-based cutting fluids, cutting tool materials, working conditions was investigated. The full factorial experimental design was employed involving 24 tests to evaluate the influence of process variables on average surface roughness (Ra), tool wear and chip formation. In general, Ra varied between 0.5 and 1.56 µm and Vasco1000 cutting fluid presented comparable performance with other fluids in terms of surface roughness while uncoated coarse grain WC carbide tool achieved lower flank wear at all cutting speeds. On the other hand, all tools tips were subjected to uniform flank wear during whole cutting trails. Additionally, formed chip thickness ranged between 0.1 and 0.14 mm with a noticeable decrease in chip size when higher cutting speed was used.Keywords: cutting fluids, turning, Ti-6Al-4V, vegetable oils, working conditions
Procedia PDF Downloads 2791628 Co-Gasification of Petroleum Waste and Waste Tires: A Numerical and CFD Study
Authors: Thomas Arink, Isam Janajreh
Abstract:
The petroleum industry generates significant amounts of waste in the form of drill cuttings, contaminated soil and oily sludge. Drill cuttings are a product of the off-shore drilling rigs, containing wet soil and total petroleum hydrocarbons (TPH). Contaminated soil comes from different on-shore sites and also contains TPH. The oily sludge is mainly residue or tank bottom sludge from storage tanks. The two main treatment methods currently used are incineration and thermal desorption (TD). Thermal desorption is a method where the waste material is heated to 450ºC in an anaerobic environment to release volatiles, the condensed volatiles can be used as a liquid fuel. For the thermal desorption unit dry contaminated soil is mixed with moist drill cuttings to generate a suitable mixture. By thermo gravimetric analysis (TGA) of the TD feedstock it was found that less than 50% of the TPH are released, the discharged material is stored in landfill. This study proposes co-gasification of petroleum waste with waste tires as an alternative to thermal desorption. Co-gasification with a high-calorific material is necessary since the petroleum waste consists of more than 60 wt% ash (soil/sand), causing its calorific value to be too low for gasification. Since the gasification process occurs at 900ºC and higher, close to 100% of the TPH can be released, according to the TGA. This work consists of three parts: 1. a mathematical gasification model, 2. a reactive flow CFD model and 3. experimental work on a drop tube reactor. Extensive material characterization was done by means of proximate analysis (TGA), ultimate analysis (CHNOS flash analysis) and calorific value measurements (Bomb calorimeter) for the input parameters of the mathematical and CFD model. The mathematical model is a zero dimensional model based on Gibbs energy minimization together with Lagrange multiplier; it is used to find the product species composition (molar fractions of CO, H2, CH4 etc.) for different tire/petroleum feedstock mixtures and equivalence ratios. The results of the mathematical model act as a reference for the CFD model of the drop-tube reactor. With the CFD model the efficiency and product species composition can be predicted for different mixtures and particle sizes. Finally both models are verified by experiments on a drop tube reactor (1540 mm long, 66 mm inner diameter, 1400 K maximum temperature).Keywords: computational fluid dynamics (CFD), drop tube reactor, gasification, Gibbs energy minimization, petroleum waste, waste tires
Procedia PDF Downloads 5201627 Root Causes of Child Labour in Hargeisa, Somaliland
Authors: Abdikarim Yusuf
Abstract:
This study uses data from Somalia to analyse child labour using a descriptive and qualitative method. The study set out to identify root causes of child labour in Hargeisa and its implications for children. The study shows that poverty, droughts, family separation, and loss of properties are primary drivers of child labour in Hargeisa. The study found that children work in very difficult jobs such as car wash, casual work, and shoe shining for boys while girls work as housemaids, selling tea, Khat and sometimes are at risk of exploitation such as sexual abuse, rape and harassment. The majority of the parents responded that they don’t know any policy, act or law that protects children. Men showed greater awareness than the women respondents in recognizing child labour as a child rights violation.Keywords: abuse, child, violence, protection
Procedia PDF Downloads 1531626 CuIn₃Se₅ Colloidal Nanocrystals and Its Ink-Coated Films for Photovoltaics
Authors: M. Ghali, M. Elnimr, G. F. Ali, A. M. Eissa, H. Talaat
Abstract:
CuIn₃Se₅ material is indexed as ordered vacancy compounds having excellent matching properties with CuInGaSe (CIGS) solar absorber layer. For example, the valence band offset of CuIn₃Se₅ with CIGS is nearly 0.3 eV, and the lattice mismatch is less than 1%, besides the absence of discontinuity in their conduction bands. Thus, CuIn₃Se₅ can work as a passivation layer for repelling holes from CIGS/CdS interface and hence to reduce the interface carriers recombination and consequently enhancing the efficiency of CIGS/CdS solar cells. Theoretically, it was reported earlier that an improvement in the efficiency of p-CIGS-based solar cell with a thin ~100 nm of n-CuIn₃Se₅ layer is expected. Recently, a reported experiment demonstrated significant improvement in the efficiency of Molecular Beam Epitaxy (MBE) grown CIGS solar cells from 13.4 to 14.5% via inserting a thin layer of MBE-grown Cu(In,Ga)₃Se₅ layer at the CdS/CIGS interface. It should be mentioned that CuIn₃Se₅ material in either bulk or thin film form, are usually fabricated by high vacuum physical vapor deposition techniques (e.g., three-source co-evaporation, RF sputtering, flash evaporation, and molecular beam epitaxy). In addition, achieving photosensitive films of n-CuIn₃Se₅ material is important for new hybrid organic/inorganic structures, where inorganic photo-absorber layer, with n-type conductivity, can form n–p junction with organic p-type material (e.g., conductive polymers). A detailed study of the physical properties of CuIn₃Se₅ is still necessary for better understanding of device operation and further improvement of solar cells performance. Here, we report on the low-cost synthesis of CuIn₃Se₅ material in nano-scale size, with an average diameter ~10nm, using simple solution-based colloidal chemistry. In contrast to traditionally grown bulk tetragonal CuIn₃Se₅ crystals using high Vacuum-based technology, our colloidal CuIn₃Se₅ nanocrystals show cubic crystal structure with a shape of nanoparticles and band gap ~1.33 eV. Ink-coated thin films prepared from these nanocrystals colloids; display n-type character, 1.26 eV band gap and strong photo-responsive behavior with incident white light. This suggests the potential use of colloidal CuIn₃Se₅ as an active layer in all-solution-processed thin film solar cells.Keywords: nanocrystals, CuInSe, thin film, optical properties
Procedia PDF Downloads 1551625 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform
Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy
Abstract:
In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack
Procedia PDF Downloads 3961624 The Use of Optical-Radar Remotely-Sensed Data for Characterizing Geomorphic, Structural and Hydrologic Features and Modeling Groundwater Prospective Zones in Arid Zones
Authors: Mohamed Abdelkareem
Abstract:
Remote sensing data contributed on predicting the prospective areas of water resources. Integration of microwave and multispectral data along with climatic, hydrologic, and geological data has been used here. In this article, Sentinel-2, Landsat-8 Operational Land Imager (OLI), Shuttle Radar Topography Mission (SRTM), Tropical Rainfall Measuring Mission (TRMM), and Advanced Land Observing Satellite (ALOS) Phased Array Type L‐band Synthetic Aperture Radar (PALSAR) data were utilized to identify the geological, hydrologic and structural features of Wadi Asyuti which represents a defunct tributary of the Nile basin, in the eastern Sahara. The image transformation of Sentinel-2 and Landsat-8 data allowed characterizing the different varieties of rock units. Integration of microwave remotely-sensed data and GIS techniques provided information on physical characteristics of catchments and rainfall zones that are of a crucial role for mapping groundwater prospective zones. A fused Landsat-8 OLI and ALOS/PALSAR data improved the structural elements that difficult to reveal using optical data. Lineament extraction and interpretation indicated that the area is clearly shaped by the NE-SW graben that is cut by NW-SE trend. Such structures allowed the accumulation of thick sediments in the downstream area. Processing of recent OLI data acquired on March 15, 2014, verified the flood potential maps and offered the opportunity to extract the extent of the flooding zone of the recent flash flood event (March 9, 2014), as well as revealed infiltration characteristics. Several layers including geology, slope, topography, drainage density, lineament density, soil characteristics, rainfall, and morphometric characteristics were combined after assigning a weight for each using a GIS-based knowledge-driven approach. The results revealed that the predicted groundwater potential zones (GPZs) can be arranged into six distinctive groups, depending on their probability for groundwater, namely very low, low, moderate, high very, high, and excellent. Field and well data validated the delineated zones.Keywords: GIS, remote sensing, groundwater, Egypt
Procedia PDF Downloads 981623 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments
Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo
Abstract:
This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.Keywords: cloud, enhancing security, fog, IoT, telehealth
Procedia PDF Downloads 791622 Irish Print Media Framing of Syrian Migration to Ireland in the Irish Times and Irish Independent
Authors: Moufida Benmoussa
Abstract:
Since the escalation of the Syrian conflict in 2011, 6.9 million Syrians have fled to neighbouring countries, and 6.7 have remained displaced in Syria. Out of the 6.9 who fled Syria, over one million have crossed the Mediterranean Sea and become refugees and asylum seekers in various European countries. As a European and a member country of the EU, the Republic of Ireland was not an exception. In response to the refugee crisis caused mainly by the Syrian displacement, Ireland established the Syrian Humanitarian Admission Programme (SHAM) in 2014 and the Irish Refugee Protection Programme (IRPP) in 2015, followed by its second phase in 2019. In light of these events, Irish print media played a significant role in covering the Irish government’s decisions, political stance, and public opinion on the debate on taking Syrian refugees into Ireland. Considering the tremendous impact of media on politics and public opinion, my research examined how The Irish Times and Irish Independent framed Syrian migration to Ireland. I adopted a qualitative framing analysis to identify the prominent framings in these two newspapers. The collection of newspaper articles focused on three periods. The first period is from the first of January 2014 to the end of December 2014. During this period, the media covered the launch of the Syrian Humanitarian Admission Programme (SHAP) and stories about the first arrival of the Syrian refugees to Ireland. The second period is the year 2015. During this year, various events gained the attention of the Irish media. These events include Ireland’s establishment of the Irish Refugee Protection Programme, the Paris attacks, and the publishing of Aylan Kurdi’s Photograph. The third period is from the first of December 2019 to the thirtieth of January 2020. In this period, the media covered the convention of Ireland with the UNHCR and the European Union to provide sanctuary to 2900 refugees in the years 2020, 2021, 2022, and 2023. The primary findings of my study indicate that The Irish Times and Irish Independent’s framing of Syrian migration to Ireland was various. My research findings indicate that The Irish Times and Irish Independent’s framing of Syrian migration to Ireland was varied and asymmetrical. The dominant frames used by these two newspapers are humanitarian, responsibility, contribution, burden, intruder, and threat. The former three frames positively perceive Syrian migration to Ireland and support the Irish government’s decisions to welcome more Syrian refugees. On the other hand, the last three frames perceive Syrian migration and refugees negatively and stand for the principle that Ireland should not take Syrian refugees.Keywords: framing, Syrian migration, Ireland, newspaper
Procedia PDF Downloads 691621 The Use of Cement Dust in the Glass Industry
Authors: Magda Kosmal, Anna A. Kuśnierz, Joanna Rybicka-Łada
Abstract:
In the case of waste glass cullet, a fully functioning recycling system for individual glass industries was developed, while recycling of cement dust encounters a number of difficulties and is conducted to a limited extent in the packaging and flat glass industry. The aim of the project was to examine the possibility of using dust arising in cement plants in the process of melting various types of glasses. Dust management has a positive effect on the aspect of environmental protection and ecology. Sets have been designed, and the parameters of the melting process have been optimized. Glasses were obtained with the addition of selected cement dust on a laboratory scale, using DTA, XRD, SEM tests, and a gradient furnace was conducted to check the tendency to crystallization.Keywords: cement dust, crystallization, glass, XRD, SEM
Procedia PDF Downloads 851620 Network User Rules in Universities
Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson
Abstract:
This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.Keywords: computer security, IT policy, security awareness, network user rules
Procedia PDF Downloads 5621619 The Fight against Terrorist Radicalization: A French Perspective
Authors: Julia Burchett
Abstract:
After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism
Procedia PDF Downloads 4311618 Screening of Commonly Used Reinforcement Materials for Tomb Murals
Authors: Liping Qiu, Xiaofeng Zhang
Abstract:
In its long history, precious tomb murals suffered from various diseases due to natural and man-made destruction. The key to how to protect tomb murals is how to strengthen and protect the tomb murals. In order to maximize the life of the tomb murals, the artistic, historic, and scientific values of the tomb murals can be continued. In this paper, four kinds of traditional reinforcement materials (silicone acrylic lotion, pure acrylic lotion, polyvinyl acetate lotion, and B72) are selected to reinforce the ground support layer of tomb murals, and the reinforcement effect of each reinforcement material on the ground support layer of murals is compared and analyzed, and the best protection material is obtained.Keywords: mural, destruction cycle, reinforcement material, disease
Procedia PDF Downloads 1331617 Achieving Product Robustness through Variation Simulation: An Industrial Case Study
Authors: Narendra Akhadkar, Philippe Delcambre
Abstract:
In power protection and control products, assembly process variations due to the individual parts manufactured from single or multi-cavity tooling is a major problem. The dimensional and geometrical variations on the individual parts, in the form of manufacturing tolerances and assembly tolerances, are sources of clearance in the kinematic joints, polarization effect in the joints, and tolerance stack-up. All these variations adversely affect the quality of product, functionality, cost, and time-to-market. Variation simulation analysis may be used in the early product design stage to predict such uncertainties. Usually, variations exist in both manufacturing processes and materials. In the tolerance analysis, the effect of the dimensional and geometrical variations of the individual parts on the functional characteristics (conditions) of the final assembled products are studied. A functional characteristic of the product may be affected by a set of interrelated dimensions (functional parameters) that usually form a geometrical closure in a 3D chain. In power protection and control products, the prerequisite is: when a fault occurs in the electrical network, the product must respond quickly to react and break the circuit to clear the fault. Usually, the response time is in milliseconds. Any failure in clearing the fault may result in severe damage to the equipment or network, and human safety is at stake. In this article, we have investigated two important functional characteristics that are associated with the robust performance of the product. It is demonstrated that the experimental data obtained at the Schneider Electric Laboratory prove the very good prediction capabilities of the variation simulation performed using CETOL (tolerance analysis software) in an industrial context. Especially, this study allows design engineers to better understand the critical parts in the product that needs to be manufactured with good, capable tolerances. On the contrary, some parts are not critical for the functional characteristics (conditions) of the product and may lead to some reduction of the manufacturing cost, ensuring robust performance. The capable tolerancing is one of the most important aspects in product and manufacturing process design. In the case of miniature circuit breaker (MCB), the product's quality and its robustness are mainly impacted by two aspects: (1) allocation of design tolerances between the components of a mechanical assembly and (2) manufacturing tolerances in the intermediate machining steps of component fabrication.Keywords: geometrical variation, product robustness, tolerance analysis, variation simulation
Procedia PDF Downloads 1641616 Reviewing Privacy Preserving Distributed Data Mining
Authors: Sajjad Baghernezhad, Saeideh Baghernezhad
Abstract:
Nowadays considering human involved in increasing data development some methods such as data mining to extract science are unavoidable. One of the discussions of data mining is inherent distribution of the data usually the bases creating or receiving such data belong to corporate or non-corporate persons and do not give their information freely to others. Yet there is no guarantee to enable someone to mine special data without entering in the owner’s privacy. Sending data and then gathering them by each vertical or horizontal software depends on the type of their preserving type and also executed to improve data privacy. In this study it was attempted to compare comprehensively preserving data methods; also general methods such as random data, coding and strong and weak points of each one are examined.Keywords: data mining, distributed data mining, privacy protection, privacy preserving
Procedia PDF Downloads 5261615 The Impact of COVID-19 Measures on Children with Disabilities and Their Families in the Kingdom of Saudi Arabia
Authors: Faris Algahtani
Abstract:
The COVID 19 pandemic and associated public health measures have disrupted the lives of peoplearound the world, including children. There is little knowledge about how pandemic measures have affected children in the Kingdom of Saudi Arabia (KSA). The aim and objectives of this qualitative study was to learn about the outcomes and impacts of the pandemic on children ages 0-8 in KSA. The study was based on 40 in-depth interviews that were conducted with experts in health, social protection, education, and early learning, children with special needs, and economics, including decision makers as well as specialists in service provision. The interviews were recorded and translated from Arabic to English into summary notes. The narrative was coded and analyzed following a thematic analysis.Keywords: disabilities, COVID-19, families, children
Procedia PDF Downloads 2141614 Multilevel Gray Scale Image Encryption through 2D Cellular Automata
Authors: Rupali Bhardwaj
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient
Procedia PDF Downloads 3791613 Improving the Dielectric Strength of Transformer Oil for High Health Index: An FEM Based Approach Using Nanofluids
Authors: Fatima Khurshid, Noor Ul Ain, Syed Abdul Rehman Kashif, Zainab Riaz, Abdullah Usman Khan, Muhammad Imran
Abstract:
As the world is moving towards extra-high voltage (EHV) and ultra-high voltage (UHV) power systems, the performance requirements of power transformers are becoming crucial to the system reliability and security. With the transformers being an essential component of a power system, low health index of transformers poses greater risks for safe and reliable operation. Therefore, to meet the rising demands of the power system and transformer performance, researchers are being prompted to provide solutions for enhanced thermal and electrical properties of transformers. This paper proposes an approach to improve the health index of a transformer by using nano-technology in conjunction with bio-degradable oils. Vegetable oils can serve as potential dielectric fluid alternatives to the conventional mineral oils, owing to their numerous inherent benefits; namely, higher fire and flashpoints, and being environment-friendly in nature. Moreover, the addition of nanoparticles in the dielectric fluid further serves to improve the dielectric strength of the insulation medium. In this research, using the finite element method (FEM) in COMSOL Multiphysics environment, and a 2D space dimension, three different oil samples have been modelled, and the electric field distribution is computed for each sample at various electric potentials, i.e., 90 kV, 100 kV, 150 kV, and 200 kV. Furthermore, each sample has been modified with the addition of nanoparticles of different radii (50 nm and 100 nm) and at different interparticle distance (5 mm and 10 mm), considering an instant of time. The nanoparticles used are non-conductive and have been modelled as alumina (Al₂O₃). The geometry has been modelled according to IEC standard 60897, with a standard electrode gap distance of 25 mm. For an input supply voltage of 100 kV, the maximum electric field stresses obtained for the samples of synthetic vegetable oil, olive oil, and mineral oil are 5.08 ×10⁶ V/m, 5.11×10⁶ V/m and 5.62×10⁶ V/m, respectively. It is observed that for the unmodified samples, vegetable oils have a greater dielectric strength as compared to the conventionally used mineral oils because of their higher flash points and higher values of relative permittivity. Also, for the modified samples, the addition of nanoparticles inhibits the streamer propagation inside the dielectric medium and hence, serves to improve the dielectric properties of the medium.Keywords: dielectric strength, finite element method, health index, nanotechnology, streamer propagation
Procedia PDF Downloads 1421612 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies
Authors: Stefano Fantin
Abstract:
The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.Keywords: cybersecurity, vulnerability, European Union, Japan
Procedia PDF Downloads 1571611 Laser Paint Stripping on Large Zones on AA 2024 Based Substrates
Authors: Selen Unaldi, Emmanuel Richaud, Matthieu Gervais, Laurent Berthe
Abstract:
Aircrafts are painted with several layers to guarantee their protection from external attacks. For aluminum AA 2024-T3 (metallic structural part of the plane), a protective primer is applied to ensure its corrosion protection. On top of this layer, the top coat is applied for aesthetic aspects. During the lifetime of an aircraft, top coat stripping has an essential role which should be operated as an average of every four years. However, since conventional stripping processes create hazardous disposals and need long hours of labor work, alternative methods have been investigated. Amongst them, laser stripping appears as one of the most promising techniques not only because of the reasons mentioned above but also its controllable and monitorable aspects. The application of a laser beam from the coated side provides stripping, but the depth of the process should be well controlled in order to prevent damage to a substrate and the anticorrosion primer. Apart from that, thermal effects should be taken into account on the painted layers. As an alternative, we worked on developing a process that includes the usage of shock wave propagation to create the stripping via mechanical effects with the application of the beam from the substrate side (back face) of the samples. Laser stripping was applied on thickness-specified samples with a thickness deviation of 10-20%. First, the stripping threshold is determined as a function of power density which is the first flight off of the top coats. After obtaining threshold values, the same power densities were applied to specimens to create large stripping zones with a spot overlap of 10-40%. Layer characteristics were determined on specimens in terms of physicochemical properties and thickness range both before and after laser stripping in order to validate the substrate material health and coating properties. The substrate health is monitored by measuring the roughness of the laser-impacted zones and free surface energy tests (both before and after laser stripping). Also, Hugoniot Elastic Limit (HEL) is determined from VISAR diagnostic on AA 2024-T3 substrates (for the back face surface deformations). In addition, the coating properties are investigated as a function of adhesion levels and anticorrosion properties (neutral salt spray test). The influence of polyurethane top-coat thickness is studied in order to verify the laser stripping process window for industrial aircraft applications.Keywords: aircraft coatings, laser stripping, laser adhesion tests, epoxy, polyurethane
Procedia PDF Downloads 781610 The Rural Q'eqchi' Maya Consciousness and the Agricultural Rituals: A Case of San Agustin Lanquin, Guatemala
Authors: Y.S. Lea
Abstract:
This paper investigates the agricultural rituals in relation to the historical continuity of cultural ideology concerning the praxis of cultural sustenance of the indigenous Mayas. The praxis is delineated in two dimensions: 1) The ceremonial and quotidian rituals of the rural Q’eqchi’ Mayas in Lanquin, Guatemala; 2) The indigenous Maya resistance of 2014 against the legislation of the 'Law for the Protection of New Plant Varieties,' commonly known as 'the Monsanto Law' in Guatemala. Through the intersection of ideology in practice, the praxis of cultural sustenance is construed.Keywords: Q'eqchi' Mayas, San Agustin Lanquin, Alta Verapaz, Guatemala, Maya animism, Q’eqchi' deities, Tzuultaq'as
Procedia PDF Downloads 2501609 Ecorium: The Ecological Project in Montevideo Uruguay
Authors: Chettou Souhaila, Soufi Omar, Roumia Mohammed Ammar
Abstract:
Protecting the environment is to preserve the survival and future of humanity. Indeed, the environment is our source of food and drinking water, the air is our source of oxygen, the climate allows our survival and biodiversity are a potential drug reservoir. Preserving the environment is, therefore, a matter of survival. The objective of this project is to familiarize the general public with environmental problems not only with the theme of environmental protection, but also with the concept of biodiversity in different ecosystems. For it, the aim of our project was to create the Ecorium which is a place that preserves many species of plants of different ecosystems, schools, malls, buildings, offices, ecological transports, gardens, and many familial activities that participated in the ecosystems development, strategic biodiversity and sustainable development.Keywords: ecological system, ecorium, environment, sustainable development
Procedia PDF Downloads 3421608 Indonesian Marriage Law Reform: A Doctrinal Research to Find the Way to Strengthen Children's Rights against Child Marriage
Authors: Erni Agustin, Zendy Prameswari
Abstract:
The Law Number 1 Year 1974 on Marriage was issued by Indonesian Government to replace the old marriage law stipulated in Burgerlijk Wetboek inherited from the Dutch colonial. The Law defines marriage as both physical and mental bond between a man and a woman as husband and wife with the purpose to form a harmonious family based on deity. Marriage shall be conducted when determined requirements are met based on the Law. Article 7 of the Law Number 1 Year 1974 stipulates the minimum age requirement to enter into marriage, which is 19 years for men and 16 years for women. This stipulation is made to make the marriage achieve the true goal to form a happy, eternal and prosperous family. It is expected at that age, each party has a mature soul and physic. However, it is possible for those who have not reached the age to enter into marriage if there is a dispensation granted by the courts or other official designated by the parents of each party in the marriage. As many other countries in the world, Indonesia has serious problems linked with the child or underage marriage. Indonesia is one of the countries with the highest absolute numbers of child marriage. In 2012, a judicial review was filed to the Constitutional Court against the provisions of the minimum age limit in the Law Number 1 Year 1974 on Marriage. The appeal was filed in order to raise the limit of minimum age for women from 16 years to be 18 years. However, the Constitutional Court considered that the provisions on the minimum age in the Law Number 1 Year 1974 on Marriage is constitutional. At the international level, Indonesia has participated in the formulation of variety of international human rights instrument which have an impact on children, and is a party to a number of them. Indonesia ratified the CRC through Presidential Decree of the Republic of Indonesia Number 36 Year 1990 on 5 September 1990. This paper attempts to analyze three main issues. Firstly, it will scrutinize the ratio legis of the stipulation on minimum age requirement to enter into marriage in the Law Number 1 Year 1974 on Marriage. Secondly, it will discuss the conformity of Indonesian marriage law to the principles and provisions on the CRC. Last, this paper will elaborate the legal measures shall be taken to strengthen the legal protection for children against child marriage. This paper is a doctrinal research using statute, conceptual and historical approaches. This study argues that The Law-making of Indonesian marriage law influenced by religious values that live in Indonesia. With regard to the conformity of Indonesian marriage law with the CRC, Indonesia is facing the issue of the compatibility of its respective national law with the CRC. Therefore, the legal measures that have to be taken are to review and amend the Indonesian Marriage Law to provide better protection for the children against underage marriage.Keywords: child marriage, children’s rights, indonesian marriage law, underage marriage
Procedia PDF Downloads 2011607 The Protection of Artificial Intelligence (AI)-Generated Creative Works Through Authorship: A Comparative Analysis Between the UK and Nigerian Copyright Experience to Determine Lessons to Be Learnt from the UK
Authors: Esther Ekundayo
Abstract:
The nature of AI-generated works makes it difficult to identify an author. Although, some scholars have suggested that all the players involved in its creation should be allocated authorship according to their respective contribution. From the programmer who creates and designs the AI to the investor who finances the AI and to the user of the AI who most likely ends up creating the work in question. While others suggested that this issue may be resolved by the UK computer-generated works (CGW) provision under Section 9(3) of the Copyright Designs and Patents Act 1988. However, under the UK and Nigerian copyright law, only human-created works are recognised. This is usually assessed based on their originality. This simply means that the work must have been created as a result of its author’s creative and intellectual abilities and not copied. Such works are literary, dramatic, musical and artistic works and are those that have recently been a topic of discussion with regards to generative artificial intelligence (Generative AI). Unlike Nigeria, the UK CDPA recognises computer-generated works and vests its authorship with the human who made the necessary arrangement for its creation . However, making necessary arrangement in the case of Nova Productions Ltd v Mazooma Games Ltd was interpreted similarly to the traditional authorship principle, which requires the skills of the creator to prove originality. Although, some recommend that computer-generated works complicates this issue, and AI-generated works should enter the public domain as authorship cannot be allocated to AI itself. Additionally, the UKIPO recognising these issues in line with the growing AI trend in a public consultation launched in the year 2022, considered whether computer-generated works should be protected at all and why. If not, whether a new right with a different scope and term of protection should be introduced. However, it concluded that the issue of computer-generated works would be revisited as AI was still in its early stages. Conversely, due to the recent developments in this area with regards to Generative AI systems such as ChatGPT, Midjourney, DALL-E and AIVA, amongst others, which can produce human-like copyright creations, it is therefore important to examine the relevant issues which have the possibility of altering traditional copyright principles as we know it. Considering that the UK and Nigeria are both common law jurisdictions but with slightly differing approaches to this area, this research, therefore, seeks to answer the following questions by comparative analysis: 1)Who is the author of an AI-generated work? 2)Is the UK’s CGW provision worthy of emulation by the Nigerian law? 3) Would a sui generis law be capable of protecting AI-generated works and its author under both jurisdictions? This research further examines the possible barriers to the implementation of the new law in Nigeria, such as limited technical expertise and lack of awareness by the policymakers, amongst others.Keywords: authorship, artificial intelligence (AI), generative ai, computer-generated works, copyright, technology
Procedia PDF Downloads 1021606 EU Regulation 868/04: Report of a Unilateral Approach on Unfair Subsidisation and Unfair Pricing Practices and Its Failure
Authors: Andrea Trimarchi
Abstract:
This paper is designed to provide a comprehensive overview on the EU Regulation No. 868/2004 concerning protection against subsidisation and unfair pricing practices regarding non-EU carriers and causing injury to Community air carriers. The analysis will focus, at first, on the exegetical scrutiny of the legal categories encompassed by the Regulation. In addition to that, while considering the peculiarities of such legal instrument, the attention will be addressed on the assessment on its effectiveness. The Regulation, indeed, having received lots of criticism, is in need of a profound revision. In this context, the present work will try to take into account the policy alternatives. In light of the failure of Regulation 868, which is to be seen as the expression of a unilateral and regional approach, there would seem to be the necessity for the aviation sector to reconsider the topic of subsidisation and unfair pricing practices in a more international oriented manner.Keywords: non-EU airlines, aviation, subisidisation, unfair
Procedia PDF Downloads 3451605 Geothermal Resources to Ensure Energy Security During Climate Change
Authors: Debasmita Misra, Arthur Nash
Abstract:
Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.Keywords: exploration, geothermal, renewable energy, sustainable
Procedia PDF Downloads 1541604 Legal Implications of a Single African Air Transport Market on Airlines and Passengers in Nigeria
Authors: Adejoke Omowumi Adediran
Abstract:
The commitment of African states to liberalise civil aviation in Africa through the implementation of the Yamoussoukro Decision of 1999 was reiterated in 2015 at the African Union Assembly meeting. A declaration was made by African Heads of government at the meeting to ensure the immediate implementation of the decision towards the establishment of a Single African Air Transport Market (SAATM) by 2017. A SAATM will imply among others, a removal of all commercial restrictions for African airlines in Africa; access to any route in Africa by African airlines without any required permit or authorisation; and a common set of regulations for airlines in African member states. As the envisioned 2017 date for launching the SAATM could not be met, a new date of January 2018 has been set. The lack of political will by African States, however, remains a prominent challenge to the realisation of the SAATM. As at June 2017, only twenty-one states had signed the commitment to actualise the decision creating the SAATM. In actualisation of the SAATM, a regulatory framework has been established to efficiently manage the new African airline industry, and regulatory texts have been adopted as part of the legal regime. This legal regime is to regulate both interstate and domestic operations. Airlines in Nigeria are currently faced with certain challenges which ultimately affect their effectiveness and passengers as well do not enjoy utmost customer satisfaction with services rendered by the airlines. Although Nigeria has demonstrated support for the SAATM since 2015, as Nigeria alongside ten other states, signed the initial commitment, whether or not SAATM will eventually be beneficial to airlines and passengers has become an issue in the light of the challenges of the Nigerian airline industry. Remarkably, the benefit of the SAATM is to a large extent ultimately determined by its legal framework. Using doctrinal research, this paper examines the legal implications of the SAATM on airlines and passengers in Nigeria. This paper analyses the legal framework of SAATM and juxtaposes this with the particular issues affecting airlines and passengers in Nigeria such as financial difficulties on the part of airlines and consumer protection as regards passengers. Among others, it can be asserted that the legal regime affords an opportunity for business expansion and creates a fair environment for competition. This is beneficial not only to the airlines but to passengers as well. In addition, in the interest of passengers, consumer rights are prescribed, and the regulations also cater for situations where airlines interrupt their services, as losses arising from these situations will be mitigated. There is indeed no doubt that the SAATM will be of great utility to both airlines and passengers in Nigeria.Keywords: airlines, civil aviation, competition, consumer protection, passengers, single African air transport market, yamoussoukro decision
Procedia PDF Downloads 1411603 The Effect of Artificial Intelligence on Banking Development and Progress
Authors: Mina Malak Hanna Saad
Abstract:
New strategies for supplying banking services to the customer have been brought, which include online banking. Banks have begun to recall electronic banking (e-banking) as a manner to replace some conventional department features by means of the usage of the internet as a brand-new distribution channel. A few clients have at least one account at multiple banks and get admission to those debts through online banking. To test their present-day internet worth, customers need to log into each of their debts, get particular statistics, and paint closer to consolidation. Not only is it time-ingesting; however, but it is also a repeatable activity with a certain frequency. To solve this problem, the idea of account aggregation was delivered as a solution. Account consolidation in e-banking as a form of digital banking appears to build stronger dating with clients. An account linking service is usually known as a service that permits customers to manipulate their bank accounts held at exceptional institutions through a common online banking platform that places a high priority on safety and statistics protection. The object affords an outline of the account aggregation approach in e-banking as a distinct carrier in the area of e-banking. The advanced facts generation is becoming a vital thing in the improvement of financial services enterprise, specifically the banking enterprise. It has brought different ways of delivering banking to the purchaser, which includes net Banking. Banks began to study electronic banking (e-banking) as a means to update some of their traditional branch functions and the use of the net as a distribution channel. Some clients have at least multiple accounts throughout banks and get the right of entry to that money owed through the usage of e-banking offerings. To examine the contemporary internet's well-worth position, customers have to log in to each of their money owed, get the information and work on consolidation. This no longer takes sufficient time; however, it is a repetitive interest at a specified frequency. To address this point, an account aggregation idea is brought as an answer. E-banking account aggregation, as one of the e-banking kinds, appeared to construct a more potent dating with clients. Account Aggregation carrier usually refers to a service that allows clients to control their bank bills maintained in one-of-a-kind institutions via a common Internet banking working platform, with an excessive subject to protection and privateness. This paper offers an overview of an e-banking account aggregation technique as a new provider in the e-banking field.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise developmente-banking, enterprise development
Procedia PDF Downloads 401602 The Ongoing Impact of Secondary Stressors on Businesses in Northern Ireland Affected by Flood Events
Authors: Jill Stephenson, Marie Vaganay, Robert Cameron, Caoimhe McGurk, Neil Hewitt
Abstract:
Purpose: The key aim of the research was to identify the secondary stressors experienced by businesses affected by single or repeated flooding and to determine to what extent businesses were affected by these stressors, along with any resulting impact on health. Additionally, the research aimed to establish the likelihood of businesses being re-exposed to the secondary stressors through assessing awareness of flood risk, implementation of property protection measures and level of community resilience. Design/methodology/approach: The chosen research method involved the distribution of a questionnaire survey to businesses affected by either single or repeated flood events. The questionnaire included the Impact of Event Scale (a 15-item self-report measure which assesses subjective distress caused by traumatic events). Findings: 55 completed questionnaires were returned by flood impacted businesses. 89% of the businesses had sustained internal flooding while 11% had experienced external flooding. The results established that the key secondary stressors experienced by businesses, in order of priority, were: flood damage, fear of reoccurring flooding, prevention of access to the premise/closure, loss of income, repair works, length of closure and insurance issues. There was a lack of preparedness for potential future floods and consequent vulnerability to the emergence of secondary stressors among flood affected businesses, as flood resistance or flood resilience measures had only been implemented by 11% and 13% respectively. In relation to the psychological repercussions, the Impact of Event scores suggested that potential prevalence of post-traumatic stress disorder (PTSD) was noted among 8 out of 55 respondents (l5%). Originality/value: The results improve understanding of the enduring repercussions of flood events on businesses, indicating that not only residents may be susceptible to the detrimental health impacts of flood events and single flood events may be just as likely as reoccurring flooding to contribute to ongoing stress. Lack of financial resources is a possible explanation for the lack of implementation of property protection measures among businesses, despite 49% experiencing flooding on multiple occasions. Therefore it is recommended that policymakers should consider potential sources of financial support or grants towards flood defences for flood impacted businesses. Any form of assistance should be made available to businesses at the earliest opportunity as there was no significant association between the time of the last flood event and the likelihood of experiencing PTSD symptoms.Keywords: flood event, flood resilience, flood resistance, PTSD, secondary stressors
Procedia PDF Downloads 432